Windows

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone

If you are a sort of hardcore computer user and you format your system usually then you should know about this thing known as Live CD. As you all know that installing new operating system properly needs a format of your drives. This takes lot of time

GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google GMail account, allowing you to use GMail as a storage medium. GMail Drive creates a virtual filesystem on top of your Google GMail account and enables you to save and retrieve files stored on your

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to “_” in

When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able

Follow The steps to block Pop up banners by changing settings in Internet Explorer. 1) Go to TOOLS and then INTERNET OPTIONS. 2) Click the SECURITY tab, move the slider up to HIGH and click APPLY. This applies the highest security settings to IE, which blocks

Open a dos prompt and type the command convert d: /fs:NTFS This command would convert your d: drive to NTFS If the system cannot lock the drive, you will be prompted to convert it during next reboot. Normally you should select yes. Conversion from fat/fat32

Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the

With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way. This tutorial I used in initial stage